A practical protocol for three-party authenticated quantum key distribution

被引:20
作者
Guan, D. J. [1 ]
Wang, Yuan-Jiun [1 ]
Zhuang, E. S. [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
关键词
Quantum cryptography; Quantum key distribution; Three-party key distribution protocol; Provable security; Standard problem reduction; RANDOM-ORACLE METHODOLOGY; ERROR-CORRECTING CODES; UNCONDITIONAL SECURITY; PRIVACY AMPLIFICATION; CRYPTOGRAPHY; INFORMATION;
D O I
10.1007/s11128-014-0767-1
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Hwang et al. proposed two three-party authenticated quantum key distribution protocols for two communicating parties to establish a session key via a trusted center. They also showed their protocols were secure by using random oracle model. However, their protocols were designed to run in an ideal world. In this paper, we present a more practical protocol by considering some issues, which have not been addressed in their protocols. These issues include (1) session key consistence, (2) online guessing attack, and (3) noise in quantum channels. To deal with these issues, we use error correction code and key evolution. We also give a formal proof for the security of our protocols by using standard reduction, instead of the random oracle model.
引用
收藏
页码:2355 / 2374
页数:20
相关论文
共 30 条
[1]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[2]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   Bounds on information and the security of quantum cryptography [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 79 (20) :4034-4037
[7]   Security of quantum key distribution against all collective attacks [J].
Biham, E ;
Boyer, M ;
Brassard, G ;
van de Graaf, J ;
Mor, T .
ALGORITHMICA, 2002, 34 (04) :372-388
[8]   Security of quantum cryptography against collective attacks [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 78 (11) :2256-2259
[9]   A proof of the security of quantum key distribution [J].
Biham, Eli ;
Boyer, Michel ;
Boykin, P. Oscar ;
Mor, Tal ;
Roychowdhury, Vwani .
JOURNAL OF CRYPTOLOGY, 2006, 19 (04) :381-439
[10]   Good quantum error-correcting codes exist [J].
Calderbank, AR ;
Shor, PW .
PHYSICAL REVIEW A, 1996, 54 (02) :1098-1105